PROJECTION CONSTRAINTS IN A QUERY PROCESSING SYSTEM

    公开(公告)号:US20230401260A1

    公开(公告)日:2023-12-14

    申请号:US17934814

    申请日:2022-09-23

    Applicant: Snowflake Inc.

    CPC classification number: G06F16/90335

    Abstract: A constraint system enforces projection constraints on data values stored in specified columns of a shared dataset when queries are received by a database system. A projection constraint identifies that the data in a column may be restricted from being projected (e.g., presented, read, outputted) in an output to a received query, while allowing specified operations to be performed on the data and a corresponding output to be provided. For example, the projection constraint may indicate a context for a query that triggers the constraint, such as based on the user that submitted the query. Enforcing projection constraints on queries received at the database system allows for data to be shared and used anonymously by entities to perform various operations without the need to tokenize the data.

    TAG-BASED DATA GOVERNANCE AUDITING SYSTEM

    公开(公告)号:US20230062496A1

    公开(公告)日:2023-03-02

    申请号:US18052990

    申请日:2022-11-07

    Applicant: Snowflake Inc.

    Abstract: A method of implementing object tagging framework starts with the processor receiving a tag creation command including a tag name. In response to the tag creation command, the processor creates a current tag. The processor then receives an association command, the tag name and a source object identifier. The processor determines a source object associated with the source object identifier. The source object includes a tag value. The processor associates the current tag with the source object. The processor receives a replication command including the source object and a target object. The processor causes replication of the source object to the target object that comprises replicating the current tag with the tag name and the tag value in the source object to the target object. Other embodiments are also described herein.

    Row-level security
    46.
    发明授权

    公开(公告)号:US11494513B2

    公开(公告)日:2022-11-08

    申请号:US17661089

    申请日:2022-04-28

    Applicant: Snowflake Inc.

    Abstract: Row-level security (RLS) may provide fine-grained access control based on flexible, user-defined access policies to databases, tables, objects, and other data structures. A RLS policy may be an entity or object that defines rules for row access. A RLS policy may be decoupled or independent from any specific table. This allows more robust and flexible control. A RLS policy may then be attached to one or more tables. The RLS policy may include a Boolean-valued expression.

    Container-centric access control on database objects

    公开(公告)号:US11372995B2

    公开(公告)日:2022-06-28

    申请号:US16745922

    申请日:2020-01-17

    Applicant: Snowflake Inc.

    Abstract: Using container-centric managed access, an administrator is enabled to define a set of future grants for each object that will be created in the future in a container managed by the administrator. When a user creates a database object, the system checks the future grants to determine if any apply to the user, the database object, or the combination. Any applicable future grants are applied to the database object before the user is allowed to modify it. As a result, the administrator is enabled to control the privileges associated with the database object even before the database object is created, while restricting individual object owners from managing privileges on their owned objects.

    Column hiding management system
    50.
    发明授权

    公开(公告)号:US12105831B2

    公开(公告)日:2024-10-01

    申请号:US18475403

    申请日:2023-09-27

    Applicant: Snowflake Inc.

    CPC classification number: G06F21/6227 G06F2221/2141

    Abstract: Systems and methods for managing column hiding are provided. The systems and methods receive, from a client device, a query associated with a table. The systems and methods determine an access restriction associated with the client device. The systems and methods identify a column of the table that is restricted by the access restriction associated with the client device. In response to identifying the column of the table that is restricted by the access restriction associated with the client device, the systems and methods provide a result of the query that excludes data corresponding to the column.

Patent Agency Ranking